{"id":1948,"date":"2016-12-01T08:44:22","date_gmt":"2016-12-01T08:44:22","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1948"},"modified":"2020-05-06T10:28:02","modified_gmt":"2020-05-06T17:28:02","slug":"dont-be-an-accomplice-in-ntp-based-ddos-attacks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/","title":{"rendered":"Don&#8217;t Be an Accomplice in NTP-based DDoS Attacks"},"content":{"rendered":"<p><em>Moats are good for stopping knights in armor, but hackers are more like rats.<\/em><\/p>\n<p>Organizations tend to harden, secure, and update servers\u2014and then forget about infrastructure device vulnerabilities. This is called the \u201ccastle and moat\u201d approach to IT security: build a strong perimeter around intellectual property, customer information, and other sensitive assets, and let it go at that\u2014leaving your base infrastructure open to sneaky direct attacks.<\/p>\n<p>The problem with this is that things have to go in and out of the castle, so no matter how deep the moat, there have to be ways to get across it. I\u2019ve talked a lot in my previous blogs about how DNS is one of those, and how it can be used to launch direct attacks on assets inside the moat\u2014especially distributed-denial-of-service (DDoS) attacks.<\/p>\n<p>Now we\u2019re seeing similar attacks that exploit another overlooked weak point: the Network Time Protocol (NTP).<\/p>\n<p>NTP is implemented in all major operating systems, network infrastructure devices, and embedded devices. Because it uses the User Datagram Protocol (UDP), NTP is susceptible to spoofing. In addition, misconfiguration of network equipment can allow enterprise infrastructures to be used as unwilling participants in a DDoS attack. This can be achieved by responding to requests for NTP updates and directing the response to a victim host and overwhelming it with NTP traffic.<\/p>\n<p>According to Kelly Jackson Higgins in her recent\u00a0<em>Dark Reading<\/em>\u00a0<a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/attackers-wage-network-time-protocol-bas\/240165063\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">article<\/a>\u00a0\u201cAttackers Wage Network Time Protocol-Based Attacks,\u201d NTP is as vulnerable as DNS to reflection-style DDoS attacks.<\/p>\n<p>Here\u2019s how it works. The hacker\u2019s servers transmit small spoofed packets that ask for large amounts of data to be sent the IP address of their target victim. The \u201cmonlist\u201d command in an older version of NTP returns a list of the last 600 hosts that connected to the server. Hackers can use this as a reconnaissance tactic to build a network profile of the target. But it makes an even better DDoS tool, because a small query can redirect megabytes of traffic. Higgins points out that NTP reflection attacks spiked in December of 2013, impacting nearly 15,000 IP addresses.<\/p>\n<p>The most obvious\u00a0fix to this problem is to make sure that you have a version number of NTP higher than the recommended minimum.\u00a0However, it may not be practical to upgrade all your appliances over night. Fortunately, there\u2019s another way to keep attackers from using NTP to get across the moat around your castle with Advanced DNS Protection.<\/p>\n<p>Using a threat-mitigation rule that comes into play when NTP is enabled, Infoblox Advanced DNS Protection provides a layer of security by ensuring that the DNS infrastructure is NOT used to amplify\u00a0and\u00a0participate in NTP attacks (it is enabled that is).\u00a0This rule monitors NTP responses and can drop them if\u00a0the packet rate seems abnormal, which is a symptom of an attack. If any source IP address sends more packets than a pre-defined value,\u00a0the appliance blocks all such traffic from this source for a\u00a0certain period of time (specified in Drop interval; default =15).<\/p>\n<p>Below is a graph from the new Prolexic report on DDoS in Q4 of 2013. DNS-based attacks increased to almost 10 percent.\u00a0Because DNS and CHARGEN attacks are methods underpinning PHP booter frameworks, escalations in these two attack vectors (DNS 9.58 percent and CHARGEN 6.39 percent) were also observed this quarter. At .026 percent, NTP is still a small slice of the bar graph\u2014but big enough for a rat to slip through.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1951\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/prolexic-300x170.jpg\" alt=\"Don't Be an Accomplice in NTP-based DDoS Attacks\" width=\"300\" height=\"170\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/prolexic-300x170.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/prolexic-768x436.jpg 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/prolexic-1024x582.jpg 1024w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/prolexic.jpg 1086w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Moats are good for stopping knights in armor, but hackers are more like rats. Organizations tend to harden, secure, and update servers\u2014and then forget about infrastructure device vulnerabilities. This is called the \u201ccastle and moat\u201d approach to IT security: build a strong perimeter around intellectual property, customer information, and other sensitive assets, and let it [&hellip;]<\/p>\n","protected":false},"author":295,"featured_media":1955,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,15,36],"class_list":{"0":"post-1948","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-security","10":"tag-threats","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Don&#039;t Be an Accomplice in NTP-based DDoS Attacks<\/title>\n<meta name=\"description\" content=\"Moats are good for stopping knights in armor, but hackers are more like rats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don&#039;t Be an Accomplice in NTP-based DDoS Attacks\" \/>\n<meta property=\"og:description\" content=\"Moats are good for stopping knights in armor, but hackers are more like rats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-01T08:44:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:28:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/\"},\"author\":{\"name\":\"Infoblox Security\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f422bb7a06be93cb128df08840ca8bf\"},\"headline\":\"Don&#8217;t Be an Accomplice in NTP-based DDoS Attacks\",\"datePublished\":\"2016-12-01T08:44:22+00:00\",\"dateModified\":\"2020-05-06T17:28:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/\"},\"wordCount\":583,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-2.jpg\",\"keywords\":[\"Infoblox\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/\",\"name\":\"Don't Be an Accomplice in NTP-based DDoS Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-2.jpg\",\"datePublished\":\"2016-12-01T08:44:22+00:00\",\"dateModified\":\"2020-05-06T17:28:02+00:00\",\"description\":\"Moats are good for stopping knights in armor, but hackers are more like rats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"Don't Be an Accomplice in NTP-based DDoS Attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Don&#8217;t Be an Accomplice in NTP-based DDoS Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/5f422bb7a06be93cb128df08840ca8bf\",\"name\":\"Infoblox Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g\",\"caption\":\"Infoblox Security\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/isecurityteam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Don't Be an Accomplice in NTP-based DDoS Attacks","description":"Moats are good for stopping knights in armor, but hackers are more like rats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Don't Be an Accomplice in NTP-based DDoS Attacks","og_description":"Moats are good for stopping knights in armor, but hackers are more like rats.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/","og_site_name":"Infoblox Blog","article_published_time":"2016-12-01T08:44:22+00:00","article_modified_time":"2020-05-06T17:28:02+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2.jpg","type":"image\/jpeg"}],"author":"Infoblox Security","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/"},"author":{"name":"Infoblox Security","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5f422bb7a06be93cb128df08840ca8bf"},"headline":"Don&#8217;t Be an Accomplice in NTP-based DDoS Attacks","datePublished":"2016-12-01T08:44:22+00:00","dateModified":"2020-05-06T17:28:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/"},"wordCount":583,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2.jpg","keywords":["Infoblox","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/","name":"Don't Be an Accomplice in NTP-based DDoS Attacks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2.jpg","datePublished":"2016-12-01T08:44:22+00:00","dateModified":"2020-05-06T17:28:02+00:00","description":"Moats are good for stopping knights in armor, but hackers are more like rats.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454-2.jpg","width":660,"height":454,"caption":"Don't Be an Accomplice in NTP-based DDoS Attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dont-be-an-accomplice-in-ntp-based-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Don&#8217;t Be an Accomplice in NTP-based DDoS Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/5f422bb7a06be93cb128df08840ca8bf","name":"Infoblox Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b1d72646d45388569e0b1577b53b561494422a95e656789193ef414ac7c7027?s=96&d=blank&r=g","caption":"Infoblox Security"},"url":"https:\/\/www.infoblox.com\/blog\/author\/isecurityteam\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/295"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1948"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1948\/revisions"}],"predecessor-version":[{"id":1959,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1948\/revisions\/1959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1955"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}